This document discusses the prospects and challenges of using information and communication technologies (ICT) for school management and record keeping. It begins by outlining several working objectives, including explaining various viewpoints on school management and the use of technologies like the internet, email, and mobile devices. It then discusses theories of management and emerging areas of focus, like personnel management and financial management. Several modes of technology in service encounters are presented, along with a comparison of virtual versus physical services. The document also covers best practices for record keeping, storage, and retention. Overall, the document analyzes how ICT can make school management more efficient but also notes challenges to adopting new technologies.
Gender refers to the roles and responsibilities of men and women that are created in our families, our societies and our cultures. The concept of gender also includes the expectations held about the characteristics, aptitudes and likely behaviours of both women and men (femininity and masculinity). Gender roles and expectations are learned. They can change over time and they vary within and between cultures. Systems of social differentiation such as political status, class, ethnicity, physical and mental disability, age and more, modify gender roles. The concept of gender is vital because, applied to social analysis, it reveals how women’s subordination (or men’s domination) is socially constructed. As such, the subordination can be changed or ended. It is not biologically predetermined nor is it fixed forever.
Gender refers to the roles and responsibilities of men and women that are created in our families, our societies and our cultures. The concept of gender also includes the expectations held about the characteristics, aptitudes and likely behaviours of both women and men (femininity and masculinity). Gender roles and expectations are learned. They can change over time and they vary within and between cultures. Systems of social differentiation such as political status, class, ethnicity, physical and mental disability, age and more, modify gender roles. The concept of gender is vital because, applied to social analysis, it reveals how women’s subordination (or men’s domination) is socially constructed. As such, the subordination can be changed or ended. It is not biologically predetermined nor is it fixed forever.
The presentation gives the basic idea on how internet is used as a powerful tool for education. In India UGC is the apex body for higher education. Also find information on INFLIBNET centre which is an Autonomous Inter-University Centre (IUC) of University Grants Commission (UGC) of India.
Definition of E-learning
Types of E-learning
Location
Purpose of E-learning
Advantages E-learning
Disadvantages of E -learning
Evaluation Methods in E -learning
CONCLUSION
The presentation gives the basic idea on how internet is used as a powerful tool for education. In India UGC is the apex body for higher education. Also find information on INFLIBNET centre which is an Autonomous Inter-University Centre (IUC) of University Grants Commission (UGC) of India.
Definition of E-learning
Types of E-learning
Location
Purpose of E-learning
Advantages E-learning
Disadvantages of E -learning
Evaluation Methods in E -learning
CONCLUSION
ICT literacy basically involves using digital technology, communication tools and/or access, manage, integrate, evaluate and create information in order to function in a knowledge society.
Read and analyze the attached case. You must discuss the case and ho.pdfinfo324235
Read and analyze the attached case. You must discuss the case and how Information Technology
is used or misused. Discuss the effectiveness and ineffectiveness of its application if appropriate,
or discuss your opinion of the case and how IT could have been more effectively used.
Each analysis must be at least 1-2 pages in length and no more than 3 pages. It should include a
section summarizing the case (1-2 paragraphs), and then an analysis of how IT was used or
misused. The analysis portion must be the bulk of the feedback. I am looking for your
observations of the case, what you think!!
http://www.gao.gov/assets/680/674906.pdf
Solution
Computer crime is a very vast topic. It includes many mal functions by computer users. It is all
about making bad use of information technology for personal interest or in order to create
troublesome situation for others.
Plagiarism is one aspect. It is passing off the work of other people as your own without giving
any credit to them. Piracy is another topic worth thinking about because people make a lot of
effort and spend lot of money to create or make something where other just make a copy of them
instant of buying the original one. Crackers are basically attention who break into computer
system and make illegitimate use of them. With the rapid evolution in Information Technology,
the numbers of crackers are also growing. It is very difficult to get hold of all these issues that is
why we have some association running, aiming to reduce and stop these concerns.
nformation technology and its systems have become so important that large organization can no
longer operate without them, not to mention operate efficiently. Each organization has its unique
purpose, use of information technology is now becomes one of most important means to achieve
the goals as claimed by Hawkins (2004). Technology could increase an organization’s
effectiveness by refine its operations, business process and internal collaboration. In the context
of education, technology could break down communication barriers between students and
faculties and among students themselves. For example, email system could enable lecturers and
students have effective communication when both of them are remote from campus and located
at different time zone of the world. Technology could also help students have better access to the
learning information, experts and learning communities. In most universities’ library system,
students could now access, view and finding citations of thousands of academic journals which
are integral part of student’s academic study from its online database and database’s associated
subscriptions. Technology could also enable active new learning modes, such as multi-media
teaching, computer lab and virtual learning environment that could connect students from
different parts of the world in one virtual environment simultaneously.
However, technology by itself could not delivery the outcomes desired and pursued by the
organiza.
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders Jerry Sakala
This is the document Jerry Sakala used to facilitate Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders. Inspired by The Alberta Digital Policy development guide.
Framework for Securing Educational E-Government Serviceijcisjournal
Enhancement in technology is leading to a change in the way governments, individuals, institutions and
business entities provide quality services to the citizen. Today's education system plays crucial role for
developing cognizance in society so e-government service is obliged to integrate with educational system.
In this work we proposed a novel framework for integrating educational service within e-government
services. One of the main tasks of this paper is to explore or propose a Secure Examination Management
System (SEMS). The system has been designed using cryptographic primitives, which enables students to
take the exam from anywhere. The student is allowed to take the exam after he gives his necessary
authentication details. In SEMS, it is important to exclude false students while ensuring the privacy for the
honest students. It allows evaluators to share student examination papers for evaluation with proper
authentication. This is done using digital signatures, authentication and confidentiality provided by public
key cryptographic system.
E-University Environment Based on E-managementijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
The impact of Technological acceptance model (TAM) outcome on implementing ac...AI Publications
Accounting software installation in Iraq's Kurdistan area will be examined in this study's primary objective. Quantitative methods were used by the researchers to determine the readiness factors for installing accounting software, including (technology readiness, human resource readiness, customer readiness, content readiness, educational readiness, leadership readiness, and cultural readiness). Erbil currently has seven small and medium-sized businesses (SME). SME's 120 administrative staff members were given the survey at random. A total of 104 people from various small and medium-sized businesses in Iraq's Kurdistan area participated in this study. Technology readiness was found to be most important, while human resource readiness came in last in Erbil SME's preparation for implementation of accounting software. There is a problem with this study because the survey questions may not be representative of the entire community of instructors and administrators at SME.
APPLICATION OF A MULTILEVEL TECHNOLOGY ACCEPTANCE MANAGEMENT MODEL FOR EFFECT...ijcsit
Effective deployment of a technology in an environment is the desire of many system developers. Positive uptake of a technology coupled with user acceptance is deemed as a key indicator towards technology acceptance. Knowledge is weighed as a strategic resource for any successful data driven decision making initiative. Institutions leverage on technological initiatives and tools to drive knowledge management (KM) initiatives that enhance quality service delivery and prudent data management. These initiatives provide the overall strategy for managing data resources. They make available knowledge organization tools and techniques while enabling regular updates. Derived benefits of positive deployment of a technological intervention are competency enhancement through gained knowledge, raised quality of service and promotion of healthy development of e-commerce. Successful and timely adoption of technological interventions through which knowledge management initiatives are deployed remains a key challenge to many organizations. This paper proposes the application of a wholesome multilevel technology acceptance management model towards effective technology deployment. The proposed model takes into account human, technological and organizational variables, which exist in a deployment environment. This model will be vital in driving early technology acceptance pred
Effective deployment of a technology in an environment is the desire of many system developers. Positive uptake of a technology coupled with user acceptance is deemed as a key indicator towards technology acceptance. Knowledge is weighed as a strategic resource for any successful data driven decision making initiative. Institutions leverage on technological initiatives and tools to drive knowledge management (KM) initiatives that enhance quality service delivery and prudent data management. These initiatives provide the overall strategy for managing data resources. They make available knowledge organization tools and techniques while enabling regular updates. Derived benefits of positive deployment of a technological intervention are competency enhancement through gained knowledge, raised quality of service and promotion of healthy development of e-commerce. Successful and timely adoption of technological interventions through which knowledge management initiatives are deployed remains a key challenge to many organizations. This paper proposes the application of a wholesome multilevel technology acceptance management model towards effective technology deployment. The proposed model takes into account human, technological and organizational variables, which exist in a deployment environment. This model will be vital in driving early technology acceptance prediction and timely deployment of mitigation measures to deploy technological interventions successfully.
Information and Communication Technology (ICT) is an integral part of business management now-a-day. It is inevitable for the smooth running of business irrespective of size and complexity. Due to the rapid development of ICT and its huge use in all spheres of our lives, businesses are also substantially influenced by it. Now, the resources of the businesses are primarily managed by using ICT supports that helps perform tasks faster and more accurate than before. But the developing countries are still struggling to introduce ICT supports in all areas of business management processes as the effort is substantially hindered by a strong but ineffective work culture. Therefore, to use ICT in business management we need to know the issues and challenges of it.
Top Cited Articles International Journal of Managing Information Technology (...IJMIT JOURNAL
International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas
The advancement of the information and communications technology has helped almost all governments across the world as they have exploited these technologies for delivering services to their citizens. However, this phenomenon may face several challenges and barriers that lead to the failure in its adoption, use, or continuous usage. In the Arab countries, the rate of failure in the use of electronic services is high in the public sector. Therefore, previous studies have concentrated on this critical issue and highlighted on the citizens’ perspective andignored the perspective of employees in the government organizations.In addition, very few previous studies dealt with the quality of the services based on the employees’viewpoint. Thus, based on the arguments that have been stated earlier, this preliminary study strives to identify the factors that may affect the electronic administrative adoption according to the employees’ perspective. With regard to the data collection, the quantitative method, self-administered questionnaires will be distributed among the staff of the Al-Mustansiriyah University, Iraq.With regard to data analysis, a partial least squares structural equation modelling will be used as a technique to analyse the collected data from a key respondent (Employee). In fact, this research strivesto enrich the literature by adding more information about the factors that may hinder theadoption of modern technologies in general and electronic administration in particular. With regard to the Al-Mustansiriyah University, the present study is considered as the first study conducted in this area; therefore the outputs will assist the government to remedy these obstacles before beginning any project in the public sector including the use of ICT instead of the conventional manner.The result of the analysis showed that system quality, service quality, trust of organization, and usefulness were found as significant factors that affect the employees’ adoption of e-administration services in University.
To Assess the Main Drawbacks of Advanced Technology for the Accounting SphereFinancialMarketCorpo
Every accountant knows that accounting is a business language and that language has undergone many
changes over the years. Dissemination in the use of information technology and the production of applications has
contributed to intense shifts in accounting firms’ Procedures as of the 1990s. From the view of accounting experts,
the influence of these advances has not been adequately analysed. The general purpose of this study was therefore to determine the effect of technological progress on the accounting sphere in Namibia. A descriptive survey
design was used to in this study, to establish whether there exists any relationship between advanced technology
and Accounting today. The results indicate that the accelerated speed of technological progress tends to challenge
conventional processes in all fields, including the accounting profession. The study also revealed that businesses
have not only embraced the revolution of advanced technology, but have also started to adopt emerging innovations in the form of accounting software, mobility and the creation of social media platforms. With a figure of
less than 50% IT-enabled use, it is obvious that accounting students and accountants do not know how to run
accounting information systems, while companies continually rely on technological advancements to conduct their
tasks.
The Use of Information and Communication Technology (ICT) and Business Manage...Dr. Nazrul Islam
Information and Communication Technology (ICT) is an integral part of business management now-a-day. It is inevitable for the smooth running of business irrespective of size and complexity all over the world. Due to the rapid development of ICT and its huge use in all spheres of our lives, businesses are also influenced by it. Now, businesses are managing their resources by using ICT support that is helping them to perform their tasks faster and accurate than before. But the developing countries like Bangladesh are still struggling to introduce ICT supports in all areas of businesses. But due to a very strong culture at work place, this effort is hindered substantially. Therefore, this paper aims at identifying the present status of the use of ICT in business management and its challenges it faces. Secondary data have been primarily used for conducting this study which was collected from the different business reports and the journal papers. An experience survey was also conducted among the senior administrators of the business houses were also included in the study. Results show that the use of ICT is very low in the small and medium business enterprises while the large businesses houses are using ICT supports. Results also show that the use of ICT primarily depends on the complexity and the nature of the business. The entrepreneurs who have ICT literacy, they are mostly using ICT supports in the management of their businesses. This study suggests that the business houses in Bangladesh should use ICT support in order to increase the efficiency at their work. But this is often depends on the ICT infrastructure of the country as a whole.
Similar to Ict applications in school management and record keeping (20)
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Ict applications in school management and record keeping
1. ICT APPLICATIONS IN
SCHOOL MANAGEMENT AND
RECORD KEEPING:
PROSPECTS AND
CHALLENGES
K.O.Oloruntegbe (Ph D, FSTAN)
Science and Technical Education,
Adekunle Ajasin University,
Akungba-Akoko
2. Working Objectives
At the end of this discussion participant would be able to:
Explain the various viewpoints on school management;
Discuss the different modes of technology in management and services, state the
usefulness of virtual services over physical services.
Explain the use of internet, e-mails, chat rooms, web sites and mobile technologies
in management;
Explain the creation, the management, and the characteristics of good records,
storage, retention and disposal.
Discuss safety of records and state the requirements of the 1998 Data Protection
Act in relation to usage of personal data;
Discuss the prospect and challenges of adopting new technology in service
3. THEORIES ON MANAGEMENT - CATEGORIZATION
As a starting point the various categorization of the subject field need
be considered. The following categories are sourced from literature.
Educational change (here we can discuss the reasons for
educational change, and the effects and impacts resulting,
particularly at an individual teacher or manager level).
Management of change (this is concerned with the conception of
management of change principles, approaches and methods adopted
in order to bring about change, and to consider attitudes to change).
4. Management approaches (this category covers specifically the
types of management approach that lend themselves to particular
purpose or outcomes, and the implications).
Organizational impacts (this category covers the impacts of
change upon organizations, both from an institutional and a
systems viewpoint).
ICT management (this tells how ICT is managed within
organizations, and the concerns and issues that face managers and
others in respect of ICT).
5. Strategic and tactical approaches (these concern the types of approach
that are involved when change and ICT use is introduced into
organizations and systems, and the impacts that this has upon support
and personnel particularly).
Personnel management (how the introduction of ICT is shifting the
needs for personnel within organizations and institutions, and the future
implications that there might be in these respects).
Resource and resource development management (this is concerned
with how resources that are ICT-based can both be developed in a range
of ways and by a variety of groups, and how their uses are managed
within educational situations).
6. Financial and procurement management (this is concerned with aspects of
finance and procurement that managers in educational situations now need to
consider).
Planning and project management (this category covers the approaches
and needs for planning and project management when different ICT uses are
being introduced into educational situations).
Managing sustainability (this category is concerned with the ways in which
managers in educational situations are now considering maintainability and
sustainability, and the implications that arise for the future).
Monitoring and evaluation processes in management (this category covers
the methods and approaches which can be used within educational situations
to monitor, evaluate and reflect upon outcomes of ICT uses for the variety of
purposes originally intended).
7. EMERGING GROUPS
The areas which are general non-ICT specific:
Educational change.
Management of change.
Management approaches.
Organizational impacts.
The areas which are general and ICT-specific:
ICT management.
Strategic and tactical approaches.
8. The areas where more ICT-specific coverage is
needed are:
Personnel management.
Resource use and resource development management.
Financial and procurement management.
Planning and project management.
Managing sustainability.
Monitoring and evaluation processes in management
9. Technology in Management and Service Encounter
Advances in communications and information
technology are having profound effect on ways we do
services in industry, in schools and other important
sectors. Online services have replaced the trivial face-to-
face interaction of service providers and
customers. Five modes of technology in service
encounter is shown below:
10. The A mode is called technology-free service encounter,
where the customer is in physical proximity to and interacts with a
human service provider. This mode represents the traditional high-touch
service that we experience at a screening service that the
SUPEB and TESCOM engage their teachers in most times. This is a
very old 19th century fashion where technology does not play a direct
role. Unfortunately, this is type we still engage in leading to time lose
and risk of lives on the death traps we call roads. Most personal care
services fall into this category, along with some professional services
such as law, consulting, and psychiatry.
11. The B mode is called technology-assisted service
encounter, because only the service provider has access to the
technology to facilitate the delivery of face-to-face service. Many
health care procedures fall in this category such as an eye exam
during the office visit to an optometrist. Traditionally, airline
representatives used a computer terminal to check in passengers
are encouraged to use check-in kiosks represented by mode E.
This is the type used in biometric data capture and analysis.
12. The C mode is called technology-facilitated
service encounter , because both the customer
and service provider have access to the same
technology. For example, a financial planner in
consultation with a client can refer to a financial
model on a personal computer to illustrate projected
returns for different risk profiles.
13. D mode, called technology-mediated service encounter, the
customer and human service provider are not physically co-located and
thus the service encounter no longer is the traditional “face-to-face”
contact. Communication is usually enabled by a voice telephone call to
access services such as making a restaurant or hostel reservation or
getting technical help from a distant call center. Consider, also, how
General Motors has bundled a remote monitoring service in its
automobiles called “OnStar” that use GPS (global positioning satellite) to
reassure stranded motorists that assistance is just a call away.
14. In mode E, called technology-generated service
encounter, the human service provider is replaced entirely with
technology that allows the customer to self-serve (i.e outsourcing the job
to their customers). This mode is becoming more common as firms
attempt to reduce the cost of providing service. Examples are ubiquitous
–bank ATMS, check-out scanning, airport check-in-kiosks, online
reservations, and interactive voice response (IVR) technology in call
centers. This is the type I used to secure appointment (sabbatical) as a
Visiting Senior Lecturer to University of Malaysia. The table below
serves to illustrate a few of the above.
15. VIRTUAL VERSUS PHYSICAL SERVICES
A comparison of virtual (electronic) and physical services is
shown in Table 2. The features represent general
characteristics that vividly differentiate the alternative
delivery system. Table 3 displays the advantages and
disadvantages of online and traditional grocery shopping,
an activity in which almost everyone participates.
Table 2. Comparison of Virtual and Physical Services
16. INTERNET AS A SERVICE ENABLER IN
MANAGEMENT
The internet is a worldwide, publicly accessible network of
interconnected computer networks that transmits data using the
standard Internet Protocol (IP). It is a “network of networks” that
consists of millions of smaller academic (.edu), business (.com),
non-profit (.org), and government (.gov) networks, which together
carry various information and services, such as electronic mail, online
chat, file transfer, streaming media, voice-over-IP (VoIP), and access
to the World Wide Web (www).
17. Email
Email can be a useful tool in the development of communication skills and
extending the learning process. Students of foreign languages use email to
correspond with native speakers abroad, for example, or to send and receive
weather data across the world and pupils with special needs find email a
valuable tool where letter writing or using the telephone would be
impossible. However, there are a number of management implications of
implementing email in school, and acceptable use of email by staff and
pupils. Should all staff and pupils have their own mailbox, should staff email
addresses be available to everyone, pupils and parents alike? Should pupils
be able to send homework by email? Schools should have a policy in place
that specifically addresses these, and related, issues.
18. Chat rooms
Chat is a way of communicating with others in real time over the internet in
virtual meeting places called ‘chat rooms’. Although mainly regarded as a leisure
activity, chat rooms can also provide educational benefits. Pupils are able to chat
with peers anywhere in the world, sharing experiences, comparing lifestyles or
working collaboratively.
Within school, pupils should only be given access to educational chat rooms.
They should be moderated to ensure that discussions are kept on topic and that
there is no bad language or inappropriate behaviour.
Good chat rooms should have clear policies and privacy statements setting out
acceptable behaviour, and these should be upheld and enforced. Guidelines for
using chat in school should be included in an acceptable use policy.
19. School websites
Many schools now have their own website, providing excellent
opportunities for showing the range and breadth of work the school
does, providing a source of information to parents, and developing
links with the wider community. There are, however, certain safety
issues that need to be considered:
A school website should take care to protect the identity of pupils:
where a child’s image appears, the name should not, and vice versa
20. Mobile technologies
The developments of mobile technologies such as phones (including
camera phones) and PDAs have many benefits for the individual and to
education. In addition to the standard services of voice calls and text
messaging, the more advanced networks such as 2.5G and 3G provide:
video messaging
mobile access to the internet
entertainment services (e.g. video streaming of sporting events)
Information-based services. Increasingly, schools need to include
these devices in acceptable use policies.
21. RECORD KEEPING
Records creation
The prime objective of records creation is to ensure that only
records needed by the system are created and enter the system.
The implication of this is that not only might unnecessary records
be created, but that some important activities could be overlooked
in the creation of records. The generation of records needs to be
managed because this is where the records enter the records
system
22. Management of Records
The management of the records after their creation is
just as important as ensuring that the right records are
captured. The basic premise of records management,
which is to 'manage organizational information so that
it is timely, accurate, complete, cost-effective,
accessible and usable' (Robek et al. 1995:7) must be
adhered to
23. Characteristics of good record keeping.
From the submission of Robek et al, 1995 above the following
characteristics of good record keeping must be upheld. These are: it must
be
(i). Timely,
(ii). Accurate,
(iii). Complete,
(iv). Cost effective,
(v).. Accessible and
(vi). Usable.
24. It is a sad thing to always find no reliable data or no data in front of our
country Nigeria in record kept by international agencies like the World
Bank, UNESCO, and World Statistics or even in African. It is either the
record is foolishly and dangerously inflated that little children are not
convinced. Examples are education expenditure per GDP, education
expenditure per child in primary schools, per student in secondary
schools (Oloruntegbe, 2012). It is a common knowledge that primary
school teachers are forced to inflate primary school enrolment for
heaven knows what reason. This is clear contradiction to quality of
good records being accurate, complete and usable.
25. Records storage
Records storage is largely concerned with the storage of records
that are no longer constantly referred to but are occasionally
needed for business. These are semi-active and inactive records.
These records often safeguard 'crucial organizational interests
hence the need to keep them for as long as they may be needed'
(Penn et al. 1994:208). Keeping these records implies identifying
them so that they can be separated from active records and then
storing them away from expensive office space
26. Records storage
Records storage is largely concerned with the storage of records
that are no longer constantly referred to but are occasionally
needed for business. These are semi-active and inactive records.
These records often safeguard 'crucial organizational interests
hence the need to keep them for as long as they may be needed'
(Penn et al. 1994:208). Keeping these records implies identifying
them so that they can be separated from active records and then
storing them away from expensive office space
27. Records retention and disposition
A records retention and disposal programme is crucial to the management of the
records of the organization. The benefits of a retention and disposition
programme are aptly summarized by Ricks et al. (1992:75–76) as follows: 'A
records retention programme provides a timetable and consistent procedures for
maintaining the organization’s records, moving the records to inactive storage
when appropriate and destroying records when they are no longer valuable to the
organization.'
The absence of record retention schedules will mean that some of the records
that are no longer needed by the system might still be kept, and those that are
still needed by the system may be destroyed. Another implication is that an
institution may lose valuable evidence and vital memory as records disposition
had not been developed systematically
28. Management of electronic records
There is no doubt that record keeping is increasingly becoming
digital (Edith Cowan University 2002). The presence of personal
computers in every office and a local area network shows that the
institutions (must make use) are increasingly making use of digital
records; they are continually being generated in electronic format and
may exist only in that format.
Research revealed that the application of ICT in record keeping in
Nigeria is near zero (Aduwa-Ogiegbaen & Iyanmu, 2005) and the
management of electronic records was unsatisfactory. The same can be
said of many institutions in Africa (Ngulube 2004b).
29. KEEPING PERSONAL DATA SECURE
All personal data needs to be kept safe and made available only to those who are authorized
to access it, and this raises a number of issues:
The first is compliance with the Data Protection Act (DPA) which requires annual
registration by schools and LEAs regarding the data they collect and keep and how they use
it.
Secondly, information is passed to third parties who are contracted to provide services
for schools. The DPA requires those who own the data and pass it to others to ensure that
measures are in place for its safety and integrity and that it is not used for any purpose other
than that for which it was collected, as well as how it will be destroyed when it is no longer
required.
What information should be passed on, what information should be held by whom and
where it will be held so that individual pupils are not identified is the one of the goals of
DPA.
30. Safe disposal
An aspect of data security that can be overlooked relates to the disposal of
computing equipment. Schools have legal responsibilities for the personal data
which will be on hard disks (including things like email and passwords). Just
deleting files or even formatting the disk is not sufficient since widely available
software programs can recover some or all of the information.
Schools are advised to check that the organization to which any equipment
may be given will provide a warranty that they also securely erase all disks. It is
advisable to consult your local technical support for advice in these areas.
If the disks contain particularly sensitive information, then the industry
recommendation is that they should be physically destroyed by fire or
smashing them.
31. GLOBALIZATION, INFORMATION MANAGEMENT
AND VISIONS (2020)
You cannot run away from your shadow was a sub topic in my
lecture presentation to school administrators in this state last year
(Oloruntegbe, 2011). The time has come that we cannot do but join
the whole world (globalization) and do things the right way it should
be done without cutting corners. We are known to always cut corners
and day dream. By now we should be well grounded in accurate
information generation and dissemination – knowledge economy –
making use and sharing information with other nations.
32. PROSPECTS AND CHALLENGES.
So much have been mentioned about the prospects of ICT in school
management and record keeping. It is an under statement to state
that it makes
work faster,
more efficient,
more effective,
more accurate,
more rewarding,
more secured using surveillance cameras in hot spots like banks
33. It helps managers to make more efficient decision from up-to-date
information (Demir, 2006). It is the in thing in the whole world;
e-administration,
e-finance,
e- government,
e-assessment,
e-attendance,
e-food,
e-everything, as the world moves on in this 21st century
(Oloruntegbe, 2011). We not do things as if we are still in the 20th C
34. CHALLENGES,
For the challenges, it must be said that any innovation is a destroyer of
tradition: thus, it requires careful planning to ensure success. By
necessity, the productivity benefits of new technology will change the
nature of work. Any introduction of new technology should include
employee familiarization to prepare workers for new tasks and to
provide input into the technology interface design (e.g., will typing skills
be required, or will employees just point and click?). There are no longer
typing position in offices in most nations of the world where workers are
computer literate and internet compliant. See table 4 for our position in
computer availability and usage among selected African nations.
35. Typing position will go. Not to worry the money expended on wages
can be used to provide employment in another sector.
All managers and administrators have to prepared and to be computer
literate and internet compliant in line with global standard..
Office operations will be less of print media but more of electronic
thereby greening the environment also along global standard. Memos,
minutes of meetings, announcement etc can go from sender to
destination through e-mail, management portal on website etc.
The configuration of the office will change in conformity with the
current standard; more computers, internet facilities, even recreation
will be in compliant.
36. Most transactions will be done online, the purchase of virtually
everything starting from the smallest sim card, recharged cards to bigger
office equipment. This will block channels of wastage and of siphoning
fund.
Staff will need to update knowledge regularly sharing and comparing
notes, with international bodies, learning and getting to knowhow things
are done with better results elsewhere.
The big picture is that you can afford to be obsolete, monotonous and
static workers of the 19th century but innovative, initiative and dynamic
worker of he 21st century. Information leads to better knowledge
acquisition, knowledge is wealth. This is to corroborate the France Prime
minister’s (2007) position that source of wealth is no longer natural
resources but science and technology, knowledge economy.
37. For services, the impact of new technology might not be
limited to the back office. It could require a change in the
role that managers and clients play in the service delivery
process. Customer reaction to the new technology,
determined through focus groups or interviews, also
provide input into the design to avoid future problems of
acceptance (e.g., consider the need for surveillance
cameras at automated teller machines).
38. Table 4. Computer and internet usage in selected African nations
Source: World Bank Working Paper No 101 – Developing Science,
mathematics and ICT Education in Sub-Saharan Africa
Country Computers per 1000people Internet Users per 1000 people
Botswana 40.7 29.7
Burkina Faso 1.6 2.1
Ghana 3.8 2.3
Namibia 70.9 26.7
Nigeria 7.1 1.7
Senegal 20.4 10.7
South Africa 72.6 68.2
Tanzania 4.2 2.3
Uganda 3.3 2.8
Zimbabwe 51.6 42.9
39. For us in this part of the globe we need to ask how many are
computer literate. How many are internet compliant? How many are
prepared to accept the innovations that come with ICT as a big
innovation? What about the problems posed by inadequate power
supply, inadequate funding and the absence of political will in
pulling the bull by the horn? It seems we have not started the
journey to relevance. Until we imbibe the right attitudes to doing
things we may never be on the mark to start the race but remain
spectators in the global relevance and economic development. May
God help us.
40. WHAT TO DO
The computer in your school and office is not for decoration.
Learn and get to use them. Encourage yourself and staff to take
computer literacy quite seriously. Order for more to complement
or go over all intending users. Get assistance to train your staff
and students from government and other agencies. There are
several non-governmental organizations, UNESCO, UNICEF
willing to help if you seek assistance. To do all these by the way
you need to be computer literate and internet compliant.
41. BIBLIOGRAPHY
Aduwa-Ogiegbaen, S.E. & Iyanmu, E.O.S. (2005). Using Information and communications
technology in secondary Schools in Nigeria: Problems and Prospeects. Educational Technology and
Society, 8, 1, 104-112
Demir, K. (2006). School management information systems in primary schools. The Turkish online
Journal of Educational Technology, 5, 2, Article 6.
Fitzsimmons, J.A. & Fitzsimmons, M.j. (2011). Service Management: Operations, Strategy,
Information Technology. New York; Mc GRaw-Hill Companies, Seventh Edition.
Oloruntegbe, K.O. (2012). Quality and Inequality in Education and Government Expenditure
among Nations: Where do Developing Nations Stand? A Paper presented at the 6th Annual Conference
on Canada International Conference on Education held in Ontario, June 2012.
Oloruntegbe, K.O. (2011). Information management in Secondary School Administration. A Paper
presented at a Seminar 2011 for Principals and Vice-Principals on Management Strategies in the Re-articulated
Secondary Schools in Ondo State, Nigeria held in Akungba in September, 2011.